Advertisement

Towards a Privacy-Preserving Reliable European Identity Ecosystem

  • Jorge Bernal Bernabe
  • Antonio Skarmeta
  • Nicolás Notario
  • Julien Bringer
  • Martin David
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10518)

Abstract

This paper introduces the ARIES identity ecosystem aimed at setting up a reliable identity framework comprising new technologies, processes and security features that ensure highest levels of quality in secure credentials for highly secure and privacy-respecting physical and digital identity management processes. The identity ecosystem is being devised in the scope of ARIES European project and aspires to tangibly achieve a reduction in levels of identity fraud, theft, wrong identity and associated crimes and to create a decisive competitive advantage for Europe at a global level.

Keywords

Identity management Privacy Biometrics Digital identities Identity derivation Secure wallet 

Notes

Acknowledgments

The project leading to this application has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 700085 (ARIES project).

References

  1. 1.
    Future-id, shaping the future of electronic identity. http://www.futureid.eu/
  2. 2.
  3. 3.
    Stork, Secure idenTity acrOss boRders linKed 2.0. https://www.eid-stork2.eu
  4. 4.
    Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). doi: 10.1007/BFb0054122 CrossRefGoogle Scholar
  5. 5.
    Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001). doi: 10.1007/3-540-44987-6_7 CrossRefGoogle Scholar
  6. 6.
    Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Persiano, G., Galdi, C. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268–289. Springer, Heidelberg (2003). doi: 10.1007/3-540-36413-7_20 CrossRefGoogle Scholar
  7. 7.
    Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, pp. 21–30. ACM, New York (2002)Google Scholar
  8. 8.
    Hardt, D. (ed.): The oauth 2.0 authorization framework (2012)Google Scholar
  9. 9.
    Hughes, J., Maler, E.: Security assertion markup language (saml) v2.0. Technical report, Organization for the Advancement of Structured Information Standards (2005)Google Scholar
  10. 10.
    Naumann, I., Hogben, G., et al.: Privacy features of european eid card specifications. Technical report, The European Union Agency for Network and Information Security (ENISA) (2009)Google Scholar
  11. 11.
    Kortuem, G., Kawsar, F., Fitton, D., Sundramoorthy, V.: Smart objects as building blocks for the internet of things. IEEE Internet Comput. 14(1), 44–51 (2010)CrossRefGoogle Scholar
  12. 12.
    Li, S., Kot, A.C.: Fingerprint combination for privacy protection. IEEE Trans. Inform. Forensics Secur. 8(2), 350–360 (2013)CrossRefGoogle Scholar
  13. 13.
    Paquin, C., Zaverucha, G.: U-prove cryptographic specification v1. 1. Technical report, Microsoft Technical report (2011). http://connect.microsoft.com/site1188
  14. 14.
    Sabouri, A., Krontiris, I., Rannenberg, K.: Attribute-based credentials for trust (ABC4Trust). In: Fischer-Hübner, S., Katsikas, S., Quirchmayr, G. (eds.) TrustBus 2012. LNCS, vol. 7449, pp. 218–219. Springer, Heidelberg (2012). doi: 10.1007/978-3-642-32287-7_21 CrossRefGoogle Scholar
  15. 15.
    Schaffers, H., Komninos, N., Pallot, M., Trousse, B., Nilsson, M., Oliveira, A.: Smart cities and the future internet: towards cooperation frameworks for open innovation. In: Domingue, J., et al. (eds.) FIA 2011. LNCS, vol. 6656, pp. 431–446. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-20898-0_31 CrossRefGoogle Scholar
  16. 16.
    The European Parliament, the Council of the European Union: Regulation (EU) no 910/2014 of the European parliament and of the council (2014)Google Scholar
  17. 17.
    Weerawarana, S., Curbera, F., Leymann, F., Storey, T., Ferguson, D.F.: Web services platform architecture: SOAP, WSDL, WS-policy, WS-addressing, WS-BPEL. WS-reliable messaging and more, Prentice Hall PTR (2005)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Department of Information and Communications Engineering, Computer Science FacultyUniversity of MurciaMurciaSpain
  2. 2.Atos Research & Innovation Identity & Privacy LabMadridSpain
  3. 3.Safran Identity & SecurityParisFrance
  4. 4.Gemalto, Integration & Consulting ServicesPragueCzech Republic

Personalised recommendations